23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

IT <strong>Security</strong> Investment – An IT application or system that is solely devoted to security. For<br />

instance, intrusion detection systems (IDS) and public key<br />

infrastructure (PKI) are examples <strong>of</strong> IT security investments.<br />

SOURCE: SP 800-65<br />

IT <strong>Security</strong> Metrics – Metrics based on IT security performance goals and objectives.<br />

SOURCE: SP 800-55<br />

IT <strong>Security</strong> Policy – The “documentation <strong>of</strong> IT security decisions” in an organization.<br />

NIST SP 800-12 categorizes IT <strong>Security</strong> Policy into three basic<br />

types:<br />

1) Program Policy—high-level policy used to create an<br />

organization’s IT security program, define its scope within the<br />

organization, assign implementation responsibilities, establish<br />

strategic direction, and assign resources for implementation.<br />

2) Issue-Specific Policies—address specific issues <strong>of</strong> concern to the<br />

organization, such as contingency planning, the use <strong>of</strong> a particular<br />

methodology for systems risk management, and implementation<br />

<strong>of</strong> new regulations or law. These policies are likely to require<br />

more frequent revision as changes in technology and related<br />

factors take place.<br />

3) System-Specific Policies—address individual systems, such as<br />

establishing an access control list or in training users as to what<br />

system actions are permitted. These policies may vary from<br />

system to system within the same organization. In addition, policy<br />

may refer to entirely different matters, such as the specific<br />

managerial decisions setting an organization’s electronic mail<br />

(email) policy or fax security policy.<br />

SOURCE: SP 800-35<br />

IT <strong>Security</strong> Training – IT <strong>Security</strong> Training strives to produce relevant and needed security<br />

skills and competencies by practitioners <strong>of</strong> functional specialties<br />

other than IT security (e.g., management, systems design and<br />

development, acquisition, auditing). The most significant difference<br />

between training and awareness is that training seeks to teach skills,<br />

which allow a person to perform a specific function, while awareness<br />

seeks to focus an individual’s attention on an issue or set <strong>of</strong> issues.<br />

The skills acquired during training are built upon the awareness<br />

foundation, in particular, upon the security basics and literacy<br />

material.<br />

SOURCE: SP 800-50<br />

Jamming – An attack in which a device is used to emit electromagnetic energy<br />

on a wireless network’s frequency to make it unusable.<br />

SOURCE: SP 800-48<br />

Pg 104

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!